Operations | Monitoring | ITSM | DevOps | Cloud

Ivanti

Ivanti Workspace Control: Migration Paths

With Ivanti Workspace Control (IWC) approaching end of life, easing your organization's migration is front of mind. Lead Sales Engineer Patrick Kaak and Senior Sales Executive Sacoro Fraenk outline why Ivanti is transitioning to User Workspace Manager (UWM) as part of its cloud-first strategy, as well as the three migration paths available to IWC users and what you'll gain from making the switch.

#CyberDefense 101: Phishing + Credential Attacks | Security Insights Ep. 40

Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

The Importance of Accurate Data to Get the Most From AI

The IT service community is rightly buzzing about the wealth of possibilities AI offers to automate service management operations and better assist customers — especially in this age of expanding Everywhere Work. But without sound data, the path to leveraging AI for IT service management becomes quite daunting. With so many more people working outside a traditional office setting, more end users than ever are logging in more often to access employee services.

Practical Demo How Ivanti Maps to CIS Controls Version 8 #ivanti

The webinar introduces the Center for Internet Security (CIS) and its mission, focusing on how Ivanti solutions map to CIS controls. Demonstrations include Ivanti Neurons for External Attack Surface Management, Risk-Based Vulnerability Management, Patch Management, and Incident Response Management. The session also clarifies Ivanti's non-affiliation with CIS, the difference between VRS and VRR, and the integration of EASM with other Neurons products.

Healing Bots Take Charge of Solving IT Problems to Enhance Employee Satisfaction

Imagine an Everywhere Work environment in which IT problems seem to magically resolve themselves before end users even realize there were issues. Printers miraculously start working again. Login issues vanish. Access to critical applications is seamless.

Introducing the Ivanti Marketplace: A Platform for Evolving Business Needs

The Ivanti Marketplace, a platform tailored to meet changing business requirements. It boasts a user-friendly interface, handpicked solutions, and self-service features. Ivanti's partners contribute unique solutions to enhance Ivanti's product range. The marketplace showcases numerous solutions categorized with comprehensive descriptions and cross-referencing. Ivanti is dedicated to providing powerful solutions and empowering customers in the everywhere work era.

Introduction to RBVM: A Solution for Vulnerability Management at Ivanti #ivanti

Derek Illum presents the RBVM solution for vulnerability management at Ivanti, detailing its functionality, benefits, and related statistics. The process involves data collection, automation, and integration with other tools. The tool, hosted in the AWS gov cloud, integrates with various systems, including Microsoft Defender for endpoint. Users can explore RBVM, focus on a risk-based approach, and utilize its dashboards and SLA management features.

Cloud Migration: Security Shines a Light on Operations' Dark Networks

Dark networks have provided a measure of security to supply-chain operations for a couple of decades. These networks are closed to the outside world, only accessible via the connections between enterprise systems – think warehouse management, enterprise resource planning, etc. – and the rugged mobile devices carried by workers within these environments. And, everything is managed by on-premises device management products that never connect beyond the business’s facilities.

Generative AI for Knowledge Management: Pros, Cons and Best Practices

Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy. Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.

AI Knowledge Management: How to Use Generative AI for Knowledge Bases

Interest in generative AI has skyrocketed since the release of tools like ChatGPT, Google Gemini, Microsoft Copilot and others. Along with the hype comes concerns about privacy, personal identifiable information (PII), security and accuracy. Organizations are treading cautiously with generative AI tools despite seeing them as a game changer. Many seek the “sweet spot” – enabling benefits right now while identifying more strategic future uses, all without compromising security.